Gongliang Chen

According to our database1, Gongliang Chen authored at least 38 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A sanitizable signcryption scheme with public verifiability via chameleon hash function.
J. Inf. Secur. Appl., 2022

2021
Compact E-Cash with Efficient Coin-Tracing.
IEEE Trans. Dependable Secur. Comput., 2021

Speaker-Independent Lipreading By Disentangled Representation Learning.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2020
A practical solution to clone problem in anonymous information system.
Inf. Sci., 2020

2019
Compact E-Cash with Practical and Complete Tracing.
KSII Trans. Internet Inf. Syst., 2019

New results on the state cycles of Trivium.
Des. Codes Cryptogr., 2019

Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics.
IEEE Access, 2019

A New Structure of Blockchain to Simplify the Verification.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Reputation-based Distributed Knowledge Sharing System in Blockchain.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Public-Key Encryption with Selective Opening Security from General Assumptions.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
An Untraceable ECC-Based Remote User Authentication Scheme.
KSII Trans. Internet Inf. Syst., 2017

Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems.
Int. J. Distributed Sens. Networks, 2017

2016
Strongly secure identity-based authenticated key agreement protocols without bilinear pairings.
Inf. Sci., 2016

Cube attack on reduced-round Enhanced-Bivium.
Proceedings of the International Conference on Security of Smart Cities, 2016

A challenge-response authentication for RFID using Enhanced-Trivium.
Proceedings of the International Conference on Security of Smart Cities, 2016

State Recovering Attack Against Quavium.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Inf. Forensics Secur., 2015

2014
Novel bit-parallel multiplier for GF(2<sup>m</sup>) defined by all-one polynomial using generalized Karatsuba algorithm.
Inf. Process. Lett., 2014

Provably secure E-cash system with practical and efficient complete tracing.
Int. J. Inf. Sec., 2014

2013
The Algorithm of AAES.
IACR Cryptol. ePrint Arch., 2013

Escrowable identity-based authenticated key agreement protocol with strong security.
Comput. Math. Appl., 2013

Strongly secure identity-based authenticated key agreement protocols in the escrow mode.
Sci. China Inf. Sci., 2013

CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

2012
Quavium - A New Stream Cipher Inspired by Trivium.
J. Comput., 2012

A New Ultralightweight RFID Authentication Protocol with Permutation.
IEEE Commun. Lett., 2012

Low complexity bit-parallel GF(2<sup>m</sup>) multiplier for all-one polynomials.
IACR Cryptol. ePrint Arch., 2012

2011
Speedup of bit-parallel Karatsuba multiplier in GF(2<sup>m</sup>) generated by trinomials.
Inf. Process. Lett., 2011

An alternative class of irreducible polynomials for optimal extension fields.
Des. Codes Cryptogr., 2011

Strongly secure identity-based authenticated key agreement protocols.
Comput. Electr. Eng., 2011

2010
An extension of TYT inversion algorithm in polynomial basis.
Inf. Process. Lett., 2010

Delegatability of an Identity Based Strong Designated Verifier Signature Scheme.
Informatica, 2010

Fast Forth Power and Its Application in Inversion Computation for a Special Class of Trinomials.
Proceedings of the Computational Science and Its Applications, 2010

2009
On the Design of Trivium.
IACR Cryptol. ePrint Arch., 2009

2008
Identity-Based Directed Signature Scheme from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2008

2007
A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology.
Proceedings of the Global Communications Conference, 2007

2006
A New Construction of Time Capsule Signature.
IACR Cryptol. ePrint Arch., 2006

Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...